Hardware  >  

Active Components

RSS Feed    Add to Google    Add to My Yahoo!
Active ComponentsReports
 
Overcoming the Modern Challenges to Corporate Records Management
sponsored by Iron Mountain
PODCAST: In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends.
Posted: 20 Sep 2012 | Premiered: Aug 30, 2012

Iron Mountain

Best Practices for Power Equipment Startup
sponsored by Square D Critical Power Competency Center
WHITE PAPER: This paper describes the need for a systematized program for new power equipment startup and the best practices and pitfalls that exist with regards to power equipment startup.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Square D Critical Power Competency Center

Cutting Edge Multicore Development Techniques for the Next Wave of Electronics Products
sponsored by IBM
WHITE PAPER: As more and more software is embedded into both consumer and industrial electronics, the electronics industry is being challenged with ensuring rigor within its software development process, often a new core competency, and the integration of hardware and software. Read this paper to learn about solutions that address these complex challenges.
Posted: 01 Sep 2010 | Published: 19 Mar 2010

IBM

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match
sponsored by Informatica
BOOK: This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

Informatica

Musings on datacentres
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Clive Longbottom discusses the key issues in managing and designing data centres.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Why threat intelligence is critical for next generation firewalls
sponsored by Dell Software
WHITE PAPER: A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

The Human Face of Big Data: Pulse of the Planet
sponsored by ComputerWeekly.com
BOOK: Big Data is about to radically transform our understanding of the planet, writes entrepreneur and commentator, Esther Dyson.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement